System Administration · Infrastructure · Security

Bashar
Mohamed
Omar

Aspiring System Administrator & Cybersecurity Analyst - University of Kigali, Final Year

I design, deploy, and manage systems, not just analyze them. Final-year Computer Science student with hands-on experience building Linux and Windows environments, configuring Active Directory, automating system tasks, and managing networked infrastructures. Strong foundation in system administration with integrated security practices. Based in Kigali, Rwanda.

2 Industry Certs
3 Lab Domains
ISC2 CC In Progress

What I Work With

🐧
Operating Systems

Comfortable administering Linux and Windows systems, including user management, service configuration, system monitoring, and basic hardening. Experience working with both server and desktop environments.

LinuxWindowsEvent Logs
🌐
Networking

Hands-on router/switch configuration, subnetting (FLSM/VLSM), and protocol implementation. Network simulation via Packet Tracer and GNS3.

TCP/IPDHCPNATSSHGNS3
🐍
Programming

Python and Bash for system automation, task scheduling, and operational tooling. Built scripts for backups, monitoring, and system management workflows.

PythonBashScriptingAlgorithms
🔍
Threat Detection & SIEM

Deployed and configured Wazuh to ingest events, write detection rules, and triage alerts. Practiced log correlation and alert investigation workflows.

WazuhLog AnalysisAlert TriageSIEM
🦠
Malware Analysis

Set up isolated VirtualBox/VMware sandboxes to safely execute and analyse malware samples. Documents behavioural IOCs and network artifacts.

VirtualBoxIOC AnalysisSandboxing
⚔️
Web Attack Detection

Trained on identifying and analysing IDOR, Log4Shell, Spring4Shell, JWT, and SAML-based attacks in live LetsDefend SOC environments.

IDORLog4ShellJWTSAML

Practical Projects

PROJECT // 001
Wazuh SIEM Home Lab

Deployed Wazuh as a full SIEM stack to simulate SOC analyst workflows. Configured agents, wrote custom detection rules, and practiced alert triage on simulated security events.

▸ Tool: Wazuh (open-source XDR/SIEM)
▸ Focus: Alert ingestion, rule writing, log correlation
▸ Outcome: Hands-on SOC analyst workflow practice
Wazuh SIEM Detection Rules Log Analysis
PROJECT // 002
Malware Sandboxing Lab

Built an isolated VM environment using VirtualBox to safely detonate and observe malware behaviour. Documented network artifacts, process trees, and indicators of compromise (IOCs).

▸ Tool: VirtualBox isolated VM
▸ Focus: Behavioural analysis, IOC documentation
▸ Outcome: Safe malware execution and observation
VirtualBox Malware Analysis IOCs Sandboxing
PROJECT // 003
Network Simulation Lab

Designed and tested multi-topology networks in Packet Tracer and GNS3 to reinforce subnetting, protocol configuration, and structured fault isolation beyond classroom exercises.

▸ Tools: Cisco Packet Tracer, GNS3
▸ Focus: FLSM/VLSM subnetting, protocol configs
▸ Outcome: Fault diagnosis across topologies
GNS3 Packet Tracer Subnetting Troubleshooting
PROJECT // 004
SSH Brute Force Detection Lab

Full attack-to-detection pipeline: simulated SSH brute force with Hydra on Kali, captured host-level evidence in auth.log, and monitored the attack through a custom Wazuh SIEM dashboard with 5 screenshots documenting the complete SOC workflow.

▸ Tools: Wazuh SIEM · Kali Linux · Hydra
▸ MITRE: T1110 — Brute Force
▸ Evidence: 5 screenshots · 1 detection rule documented
Wazuh Hydra SSH SIEM Alert Triage
VIEW FULL WRITE-UP →
PROJECT // 005
Scripting & Automation Hub

Centralized hub of system administration and cybersecurity automation scripts developed through hands-on Linux practice. Includes multiple tools for backup automation, system monitoring, security hardening, and operational utilities.

▸ Scope: Multi-script automation portfolio
▸ Categories: System Automation · Security · Monitoring · Utilities
▸ Stack: Bash · Python · Powershell · Linux tools · cron
▸ Purpose: Infrastructure automation & system operations
Linux Bash Python Powershell Automation SysAdmin Cybersecurity
VIEW SCRIPTS →
PROJECT // 006
Active Directory Enterprise Lab

Designed and deployed a multi-OS enterprise lab environment using Windows Server and Ubuntu. Configured Active Directory Domain Services, DNS, and centralized identity management (OUs, users, groups). Applied Group Policy for system configuration and security, and validated authentication across domain-joined machines.

▸ Tools: Windows Server 2016 · Ubuntu Server · VirtualBox
▸ Focus: Active Directory · DNS · Group Policy · Identity Management
▸ Evidence: 8+ screenshots · domain join · GPO enforcement validation
Active Directory Windows Server Linux DNS GPO SysAdmin
VIEW FULL WRITE-UP →

Professional Background

Feb 2026 — Apr 2026 Natcom Rwanda
Kigali, Rwanda

COMPLETED
Networking Intern

Hands-on infrastructure internship focused on network configuration, system connectivity, and troubleshooting across multi-device environments.

  • Configured and validated 3 routers and 2 switches across simulated multi-topology lab environments, ensuring full Layer 2/3 connectivity before handoff
  • Implemented DHCP, NAT, SSH, and Telnet protocol stacks to establish secure, routable communication across FLSM and VLSM-segmented architectures
  • Designed subnetting schemes using FLSM and VLSM supporting efficient IP allocation across diverse network topologies
  • Fabricated straight-through and crossover cables to IEEE 568B standards, reducing patch-panel setup errors
  • Diagnosed and resolved connectivity faults across multiple topologies using structured troubleshooting at physical, data link, and network layers
ESC / CLICK TO CLOSE

Certifications

IN PROGRESS
ISC2 Certified in Cybersecurity (CC)
Issuer: ISC2 — globally recognized entry-level security certification
Topics: Security principles · Business continuity · Access controls · Network security · Security operations
Skills: Security governance · Risk management · Incident response fundamentals
CERT
IN
PROGRESS
COMPLETED
Web Attack Detection & Analysis
Issuer: LetsDefend — SOC analyst training platform
Topics: IDOR · Log4Shell · Spring4Shell · Text4Shell · JWT attacks · SAML-based exploits
Skills: Web attack pattern recognition · Live SOC environment analysis · Exploit detection
LetsDefend Web Attack Certificate
COMPLETED
Cybersecurity for Students
Issuer: LetsDefend — SOC analyst training platform
Topics: Networking · Linux · Windows · SIEM operations · Malware analysis · Introduction to Cryptology
Skills: Log analysis · System administration · Threat monitoring · Cryptographic concepts
LetsDefend Cybersecurity for Students Certificate

Let's Connect

Currently seeking system administration or IT infrastructure internships, with strong interest in secure system operations.